27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Edwin Leigh Armistead and Thomas Murphy<br />

these elements of strategic communication can be on levels at, above or below the USG<br />

enterprise level. They could involve higher-level international strategic goals and the implied<br />

communication. Alternatively, they could consider objectives and themes in lower level<br />

operational organizations to be coordinated with and communicated by various communication,<br />

information, and influence assets.<br />

Communication, information, and influence capabilities are broadcast, dissemination, and<br />

engagement elements of SC. Communication, information, and influence capabilities include<br />

public affairs, perception management, psychological operations (PSYOP now MISO), defense<br />

support to public diplomacy (DoD to DoS), and civil affairs. These capabilities are thus very broad.<br />

They can be combined with elements of force, such as maneuver conducting civil-military<br />

operations or military police. They might include the interactions of any element of the USG<br />

military, diplomatic or other forces with foreign populations or the prevalence of language and<br />

cultural awareness training across the force. They might include any action or comment by every<br />

deployed diplomatic or military service member.<br />

Knowledge of human dynamics and analysis or assessment capabilities are the fundamental<br />

bases for all the preceding specified activities. In contrast to processes, knowledge, analysis and<br />

assessment are the bases of accurate models for planning effective, efficient, and successful<br />

actions. Knowledge is obtained via media monitoring, media use pattern research, target<br />

audience analysis, and social, historical, cultural, and language expertise, along with other<br />

relevant analytic and assessment capabilities. “Cultural knowledge and audience analysis are<br />

critical for translating broad strategic goals into information and influence goals. Understanding<br />

audiences specifically and human dynamics generally is critical to identifying themes, messages,<br />

and engagement approaches that will lead to desired outcomes. Data collection and assessment<br />

contribute the feedback that allows two-way communication and engagement (rather than just<br />

broadcast) and that also makes it possible to demonstrate and report impact or effect from<br />

communication activities.” (Paul, 2010)<br />

Thus, the academic researcher could contribute SC applications of Business Marketing, Psychology,<br />

Narratives, Political Science, Economics, and many other disciplines.<br />

5. Future areas of research<br />

Several assumptions must be made when determining IA/ IO needs over the next five years. The first<br />

is that the U.S. economy will continue to rebound from the great recession. The second is that the<br />

U.S. will fund continuing IA efforts in the Federal budget. The third assumption is that information<br />

operations will continue to a growth market, thus the continuing need to bolster IA needs,<br />

requirements and solutions. Continued introduction of unique discriminating Security offerings, such<br />

as an integrated set of IO services, will be vital to keeping revenue up in the contracted companies. IA<br />

services price elasticity is based on the demand from the customer base and costs for having<br />

qualified, trained and certified personnel. These personnel allow the contract team to reach critical<br />

mass in Knowledge Management, create a good reputation, and built consistent security teams to<br />

provide IA functions to customers. Given these assumptions, the customer base will remain high and<br />

that their IA needs and requirements, as well as their budgets, will continue to grow. Acquiring and<br />

maintaining personnel to support IA/IO contract teams will continue to be a challenge to employers<br />

and an opportunity for academics.<br />

How will current capabilities and technologies develop and evolve over the next five years? We can<br />

expect the introduction of a host of new technologies presenting opportunities for IT security vendors.<br />

Many of these will be wireless devices, particularly nomadic devices for home and business users.<br />

The expectation is the continued increased blending of technologies, such as is just beginning to<br />

occur in Internet and cable TV technologies. Increasingly, users of computing devices will have<br />

access to a combination of web-based technologies, including traditional HTTP/IP communications,<br />

streaming video, voice over IP (VOIP), global positioning systems and database applications. Users<br />

will be able to seamlessly move between these technologies via increasingly sophisticated user<br />

interfaces and input/output devices. The blending of technologies, along with increased use of<br />

service-oriented architecture (SOA), will increase the need for multi-level and cross-domain security<br />

capabilities. Cross-domain security requirements will increase significantly, as the ability to share data<br />

across SOAs will increase the need for securing privacy and classified data extracted from databases<br />

for use in other applications. Likewise, the DoD trend towards employing SOAs to support net centric<br />

operations will make C&A increasingly difficult. Biometric identification and access control<br />

technologies will be a growth industry, particularly in the area of identity verification technologies for<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!